CVE-2024-35845Use of Externally-Controlled Format String in Linux

Severity
9.1CRITICALNVD
OSV7.0OSV6.5OSV5.5
EPSS
0.3%
top 49.56%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 17
Latest updateJul 26

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: dbg-tlv: ensure NUL termination The iwl_fw_ini_debug_info_tlv is used as a string, so we must ensure the string is terminated correctly before using it.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:HExploitability: 3.9 | Impact: 5.2

Affected Packages5 packages

NVDlinux/linux_kernel5.55.10.214+5
Debianlinux/linux_kernel< 5.10.216-1+3
Ubuntulinux/linux_kernel< 5.15.0-112.122+1
CVEListV5linux/linuxa9248de42464e546b624e3fc6a8b04b991af3591fabe2db7de32a881e437ee69db32e0de785a6209+7
debiandebian/linux< linux 6.1.85-1 (bookworm)

Also affects: Debian Linux 10.0

Patches

🔴Vulnerability Details

17
OSV
linux-raspi vulnerabilities2024-07-26
OSV
linux-ibm-5.15 vulnerabilities2024-07-10
OSV
linux-hwe-5.15 vulnerabilities2024-07-04
OSV
linux-oracle vulnerabilities2024-07-04
OSV
linux-azure, linux-azure-fde vulnerabilities2024-06-14

📋Vendor Advisories

17
Ubuntu
Linux kernel vulnerabilities2024-07-26
Ubuntu
Linux kernel (IBM) vulnerabilities2024-07-10
Ubuntu
Linux kernel (Oracle) vulnerabilities2024-07-04
Ubuntu
Linux kernel (HWE) vulnerabilities2024-07-04
Ubuntu
Linux kernel vulnerabilities2024-06-14

💬Community

1
Bugzilla
CVE-2024-35845 kernel: wifi: iwlwifi: dbg-tlv: ensure NUL termination2024-05-18